Количество 4
Количество 4
CVE-2017-5226
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
CVE-2017-5226
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
CVE-2017-5226
When executing a program via the bubblewrap sandbox, the nonpriv sessi ...
GHSA-m28g-vfcm-85ff
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-5226 When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox. | CVSS3: 10 | 9% Низкий | почти 9 лет назад | |
CVE-2017-5226 When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox. | CVSS3: 10 | 9% Низкий | почти 9 лет назад | |
CVE-2017-5226 When executing a program via the bubblewrap sandbox, the nonpriv sessi ... | CVSS3: 10 | 9% Низкий | почти 9 лет назад | |
GHSA-m28g-vfcm-85ff When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox. | CVSS3: 10 | 9% Низкий | больше 3 лет назад |
Уязвимостей на страницу